Publications

Export 336 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :275-276.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
Greenfieldboyce D, Foster JS.  2007.  Type qualifier inference for Java. ACM SIGPLAN Notices. 42:321-336.
Gross KC, Urmanov A, Votta LG, McMaster S, Porter A.  2006.  Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
Guerra-Filho G, Aloimonos Y.  2006.  Towards a sensorimotor WordNet SM: Closing the semantic gap. Proc. of the International WordNet Conference (GWC).
Guha ML, Druin A, Montemayor J, Chipman G, Farber A.  2007.  A theoretical model of children's storytelling using physically-oriented technologies (SPOT). Journal of Educational Multimedia and Hypermedia. 16(4):389-389.
H
Haas SW, Denn S, Locke D, Shneiderman B, Brown L.  2006.  Toward an enriched (and revitalized) sense of help: Summary of an ASIS&T 2005 panel session. Bulletin of the American Society for Information Science and Technology. 32(5):23-26.
Hackner DR, Memon AM.  2008.  Test case generator for GUITAR. Companion of the 30th international conference on Software engineering. :959-960.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Haghpanah Y, desJardins M, others.  2011.  A trust model for supply chain management. The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. :1375-1376.
Hannenhalli S, Pevzner P.  1996.  To cut… or not to cut (applications of comparative physical maps in molecular evolution). Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms. :304-313.
Hannenhalli S, Pevzner P.  1995.  Transforming cabbage into turnip: polynomial algorithm for sorting signed permutations by reversals. Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. :178-189.
Hannenhalli S, Putt ME, Gilmore JM, Wang J, Parmacek MS, Epstein JA, Morrisey EE, Margulies KB, Cappola TP.  2006.  Transcriptional Genomics Associates FOX Transcription Factors With Human Heart Failure. Circulation. 114(12):1269-1276.
Hannenhalli S, Levy S.  2003.  Transcriptional regulation of protein complexes and biological pathways. Mammalian Genome. 14(9):611-619.
Hannenhalli S.  1995.  Transforming men into mice (a computational theory of genome rearrangements).
Hannenhalli S, Pevzner P.  1995.  Towards a computational theory of genome rearrangements. Computer Science TodayComputer Science Today. 1000:184-202.
Hannenhalli S, Pevzner PA.  1995.  Transforming men into mice (polynomial algorithm for genomic distance problem). Foundations of Computer Science, Annual IEEE Symposium on. :581-581.
Hannenhalli S, Pevzner PA.  1999.  Transforming cabbage into turnip: polynomial algorithm for sorting signed permutations by reversals. J. ACM. 46(1):1-27.
Haran M, Karr A, Last M, Orso A, Porter A, Sanil A, Fouch? S.  2007.  Techniques for Classifying Executions of Deployed Software to Support Software Engineering Tasks. IEEE Transactions on Software Engineering. 33(5):287-304.
Harris C, Allen RB, Plaisant C, Shneiderman B.  1999.  Temporal visualization for legal case histories. PROCEEDINGS OF THE ANNUAL MEETING-AMERICAN SOCIETY FOR INFORMATION SCIENCE. 36:271-279.
Hayden CM, Hardisty EA, Hicks MW, Foster JS.  2009.  A Testing Based Empirical Study of Dynamic Software Update Safety Restrictions. Technical Reports of the Computer Science Department.
Hicks B, King D, McDaniel P, Hicks MW.  2006.  Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
Hicks MW, Jagannathan S, Kelsey R, Moore JT, Ungureanu C.  1999.  Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
Hicks MW, Swamy N, Tsang S.  2007.  Toward Specifying and Validating Cross-Domain Policies. Technical Reports from UMIACS.
Hicks MW.  1998.  Types and intermediate representations. Technical Reports (CIS). :796-796.

Pages